20.4 (L1) Ensure 'Only Authorized Software is Installed'

Information

This setting ensures that only approved software will execute on the system by deploying a deny-all, permit-by-exception policy.

Approved software should be kept to a minimum such as, Endpoint Protection and Web Browser.

Deploying a deny-all, permit-by-exception policy (allowlist) is a defense in depth measure that can help stop the execution of malware, ransomware and other threats. It also allows an organization to accurately track which software is running on the system.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Deploy a deny-all, permit-by-exception policy (allowlist) application such as Windows Defender Application Control (AppLocker).

If Windows Defender Application Control (AppLocker) is used, it can be configured via group policy at the following location.

Computer Configuration\Administrative Templates\System\Device Guard\Deploy Windows Defender Application Control

For more information on Windows Defender Application Control (AppLocker) policies via Group Policy, please see the following Microsoft Documentation:

Deploy WDAC policies via Group Policy (Windows) - Windows security | Microsoft Docs

and/or

AppLocker (Windows) - Windows security | Microsoft Docs

.

Impact:

Software that is not on the allowlist will not run on the system.

See Also

https://workbench.cisecurity.org/benchmarks/17610

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-3, 800-53|SI-16

Plugin: Windows

Control ID: e1556ab93f989386009f62b1bb9a4ddd80da3e235d4ff4faae77048df40d4004